Commit Graph

1497 Commits (47234786ea9e3c56eb97ed37aaaf7146b92fb4df)
 

Author SHA1 Message Date
Tim Möhlmann be7dc1e6bd
Merge pull request from usrpro/deploy-docks
Add deploy settings for server
Tim Möhlmann 533a6f8faa
Add deploy settings for server
Tim Möhlmann c0645eadef
Remove healthcheck
Did not work correctly and prevents Traefik from serving the page.
Tim Möhlmann d96debb2a6
Merge pull request from usrpro/setup-deploy
Setup deploy
Tim Möhlmann e994fefb2d
Remove the test branch
kaiyou 66844fbca8
Merge pull request from usrpro/fix-mailu_version_docs
Use MAILU_VERSION from Travis for Docs build
Tim Möhlmann 1df3b46454
Use ADDRESS instead of HOSTNAME
Tim Möhlmann 8ef0493f53
Define external web network for Traefik connections
Tim Möhlmann db9a3787b1
Disable healthcheck, doen't work in versioned env
Tim Möhlmann 3655c7c902
Merge remote-tracking branch 'origin/fix-setup-bugs' into setup-deploy
Tim Möhlmann 9c284c4004
Prepare setup for multi-ver deployment on docs server
Tim Möhlmann a5d6acfb96
Use MAILU_VERSION from Travis for Docs build
Tim Möhlmann 3c4ee1b31e
Merge pull request from kaiyou/master
Fixes  regarding application context
ofthesun9 97b3a85090
Merge pull request from hoellen/fix-alias-match-behaviour
fix alias match behaviour
mergify-bot 09a50b6cfc Merge branch 'master' into 'master'
mergify[bot] 5795d8be16
Merge pull request from kaiyou/fix-remove-debug
Remove some forgotten debugging, fix 
kaiyou 4060ac2223 Remove some forgotten debugging
kaiyou 087841d5b7 Fix the way we handle the application context
The init script was pushing an application context, which maked
flask.g global and persisted across requests. This was evaluated
to have a minimal security impact.

This explains/fixes : flask_wtf caches the csrf token in the
application context to have a single token per request, and only
sets the session attribute after the first generation.
kaiyou b5f51b0e2e Update python dependencies
mergify[bot] 0f4ba39141
Merge pull request from usrpro/fix-networks-bug
Fixed networks indentation
Ionut Filip 514d179db1 Fixed networks indentation
Ionut Filip bb0fd896b3 Fix some bugs in setup for stack flavor
- Unbound and webmail images were hardcoded
- Removed unnecesary environment keyword
hoellen 8fe9e695f3 prefer non-wildcard aliases over wildcard aliases
Tim Möhlmann c7dcfee882
Merge pull request from pgeorgi/extend-nginx
nginx: Allow extending config with overrides
hoellen 79768c09f6 fix alias matching behaviour
mergify[bot] 74693ee47c
Merge pull request from usrpro/clamav-health-start
Increase health start period for clamav's DB download
Tim Möhlmann c1839b1ec1
Increase health start period for clamav's DB download
Tim Möhlmann 6ca8ed437d
Merge pull request from Nebukadneza/add_front_certificate_reload
Add certificate watcher for external certs to reload nginx
Tim Möhlmann 94e42c9b52
Merge pull request from usrpro/feat-subnet2
Move the Mailu Docker network to a fixed subnet.
Tim Möhlmann 33c0a99ffc
Merge pull request from hacor/k8s-cni-fix
Added kubernetes CNI support for Mailu
Tim Möhlmann bb85079d92
Merge pull request from ofthesun9/master-patch1
POD_ADDRESS_RANGE need to be defined for admin service (dovecot authentific…
mergify-bot 491f6b24bb Merge branch 'master' into 'feat-subnet2'
Dario Ernst 1aa97c9914 Add certificate watcher for external certs to reload nginx
In case of TLS_FLAVOR=[mail,cert], the user supplies their own certificates.
However, since nginx is not aware of changes to these files, it cannot
reload itself e.g. when the certs get renewed.

To solve this, let’s add a small daemon in the place of
`letsencrypt.py`, which uses a flexible file-watching framework and
reloads nginx in the case the certificates change ….
Tim Möhlmann c00910ca4b
Merge remote-tracking branch 'upstream/master' into extend-nginx
Tim Möhlmann 97d338e68a
Rectify 'endif' placement
Tim Möhlmann 7f46876b0c
Merge pull request from usrpro/attachment-size
Dynamic attachment size limit
Tim Möhlmann 425cdd5e77
Fix syntax errors
Tim Möhlmann 20f1faf6d0
Send 404 when nothing server at '/'
Prevents Nginx welcome screen
Tim Möhlmann c25ba75d68
Include WEBROOT_REDIRECT in setup templates
Tim Möhlmann 9208d7262f
Correct variable naming in .env
Tim Möhlmann 2de4995fec
Don't redirect when webmail is served on '/'
Tim Möhlmann 28daa22842
Merge pull request from usrpro/update-mergify
review/need2 in mergify
Tim Möhlmann 8e5ccf2754
Don't merge when WIP or Blocked
Tim Möhlmann 626559f99b
Mergify dismiss reviews
Ionut Filip 94edb48f08 Dynamic attachment size
Tim Möhlmann a2a9512afa
Enable mergify strict mode
In the past we had strict mode in branch protection. This didn't really work as it broke mergify. Now mergify supports this options and takes care of the merging automatically. Let's see how it goes ;)

Reason is the recent build failures we had on master, during a busy merge day. This could have been prevented if sequential PR's where re-merging with master.

More info: https://doc.mergify.io/strict-workflow.html
Tim Möhlmann f0906073e3
Merge remote-tracking branch 'upstream/master' into feat-subnet2
mergify[bot] a634c7b72d
Merge pull request from usrpro/fix-outlook2019-smtp
Add login method to smtp_auth under ssl
Tim Möhlmann 38eb266c25
Merge pull request from usrpro/fix-autobuild
Fix autobuild
Tim Möhlmann c0972face6
Correct subnetting functionality for the tests and setup